Exam 1: Network Security Fundamentals
Exam 1: Network Security Fundamentals50 Questions
Exam 2: TCP-IP50 Questions
Exam 3: Network Traffic Signatures49 Questions
Exam 4: Routing Fundamentals50 Questions
Exam 5: Cryptography50 Questions
Exam 6: Wireless Network Fundamentals50 Questions
Exam 7: Understanding Wireless Security50 Questions
Exam 8: Intrusion Detection and Prevention Systems50 Questions
Exam 9: Firewalls50 Questions
Exam 10: Firewall Design and Management50 Questions
Exam 11: VPN Concepts50 Questions
Exam 12: Internet and World Wide Web Security50 Questions
Exam 13: Security Policy Design and Implementation50 Questions
Exam 14: On-Going Security Management50 Questions
Select questions type
What is a program that appears to do something useful but is actually malware?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
C
What can an attacker use a port scanner to test for on a target computer?
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
C
Discuss scripting and how it relates to network security.
Free
(Essay)
4.9/5
(33)
Correct Answer:
A widespread network intrusion that is increasing in frequency and severity is the use of scripts-executable code attached to e-mail messages or downloaded files that infiltrates a system.It can be difficult for a firewall or intrusion-detection system (IDS)to block all such files; specialty firewalls and other programs should be integrated with existing security systems to keep scripts from infecting a network.
MATCHING
-Computer files that copy themselves repeatedly and consume disk space or other resources
(Multiple Choice)
4.9/5
(31)
MATCHING
-The process of recording which computers are accessing a network and what resources are being accessed,and then recording the information in a log file
(Multiple Choice)
4.8/5
(27)
MATCHING
-A network connection consisting of a port number combined with a computer's IP address
(Multiple Choice)
4.8/5
(31)
Which type of firewall policy calls for a firewall to deny all traffic by default?
(Multiple Choice)
4.8/5
(35)
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?
(Multiple Choice)
4.9/5
(29)
What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?
(Multiple Choice)
4.9/5
(38)
MATCHING
-An area in random access memory (RAM)reserved for the use of a program that "listens" for requests for the service it provides
(Multiple Choice)
4.8/5
(30)
______________ do not require user intervention to be launched; they are self-propagating.
(Short Answer)
4.7/5
(37)
MATCHING
-A method of authenticating a user using physical information,such as retinal scans,fingerprints,or voiceprints
(Multiple Choice)
4.7/5
(32)
Which term is best described as an attack that relies on the gullibility of people?
(Multiple Choice)
5.0/5
(28)
________________ events usually track the operations of the firewall or IDPS,making a log entry whenever it starts or shuts down.
(Short Answer)
5.0/5
(36)
Why might you want your security system to provide nonrepudiation?
(Multiple Choice)
4.7/5
(40)
Which of the following is NOT information that a packet filter uses to determine whether to block a packet?
(Multiple Choice)
4.8/5
(30)
In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?
(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)